US20100095062A1 - Data exchange between protected memory cards - Google Patents

Data exchange between protected memory cards Download PDF

Info

Publication number
US20100095062A1
US20100095062A1 US12/577,288 US57728809A US2010095062A1 US 20100095062 A1 US20100095062 A1 US 20100095062A1 US 57728809 A US57728809 A US 57728809A US 2010095062 A1 US2010095062 A1 US 2010095062A1
Authority
US
United States
Prior art keywords
memory card
managing unit
memory
data
credential
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/577,288
Other versions
US8700848B2 (en
Inventor
Najib Koraichi
Sebastiaan Hoeksel
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vodafone Holding GmbH
Original Assignee
Vodafone Holding GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vodafone Holding GmbH filed Critical Vodafone Holding GmbH
Assigned to VODAFONE HOLDING GMBH reassignment VODAFONE HOLDING GMBH ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HOEKSEL, SEBASTIAAN, KORAICHI, NAJIB
Publication of US20100095062A1 publication Critical patent/US20100095062A1/en
Application granted granted Critical
Publication of US8700848B2 publication Critical patent/US8700848B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect

Definitions

  • Memory cards are integrated circuit (IC) cards including non-volatile memory and a controller, which controls the operation of the memory card. Such memory cards are used with personal computers (PCs), cellular telephones, personal digital assistants (PDAs), digital cameras, portable audio players and other host electronic devices for storage of data.
  • PCs personal computers
  • PDAs personal digital assistants
  • SD Secure Digital
  • CF Compact Flash
  • MMCs Multimedia Cards
  • Memory cards of the type described before may provide a security mechanism for protecting data from unauthorized access.
  • the card owner may access the data using a credential, such as, for example, a password.
  • a credential such as, for example, a password.
  • This allows for storing sensitive data in the memory card, such as, for example, banking details of the card owner, medical data of the card owner and personal photographs or other personal data.
  • Exemplary embodiments of the present invention may relate to memory cards with access protection. More specifically, an exemplary embodiment of the present invention may relate to a method, a device and a system for transferring data from a first memory card to a second memory card.
  • An exemplary embodiment of the present invention may allow for transferring data from one protected memory card of a user to another protected memory card of the user.
  • a method for transferring data from a first memory card to a second memory card is suggested.
  • Each memory card allows reading and/or writing access upon verification of an allocated credential.
  • the method comprises the following steps:
  • An exemplary embodiment of the invention provides a device for transferring data from a first memory card to a second memory card.
  • the exemplary system comprises at least two memory cards, each memory card allowing reading and/or writing access upon verification of an allocated credential.
  • the memory cards can be coupled to a managing unit storing the credentials allocated to the memory cards.
  • the managing unit may be adapted to receive data from the first memory card and to forward the data to the second memory card.
  • the managing unit may be further adapted to provide to the second memory card the credential allocated to the second memory card.
  • an exemplary system for transferring data from a first memory card to a second memory card comprises the device and a first memory card and a second memory card.
  • the second memory card may be adapted to store the data in the second memory card after having successfully verified the credential provided by the managing unit of the device.
  • Exemplary embodiments of the present invention may store credentials, which are necessary to read data from a memory card and/or write data to a memory card, in a managing unit.
  • the managing unit may be used for transferring data from one protected memory card to another. This allows the owner of the memory cards to copy or move data from one memory card to another in an easy and convenient way.
  • the managing unit identifies the second memory card using an identification feature read out from the second memory card in order to be able to determine the credential allocated to the second memory card.
  • the identification feature which may be an identification code, for example, may be stored in the memory card in unprotected form. In particular, it may be accessible without having to provide the allocated credential to the memory card.
  • the credential allocated to the second memory card may be determined using an allocation between the identification code and the credential stored in the managing unit.
  • a card reader unit coupled to the managing unit receives the first memory card, when the data is transmitted form the first memory card to the managing device.
  • the card reader unit receives the second memory card, when the data is forwarded from the managing device to the second memory card.
  • the data can be transferred from one protected memory card to another using only one card reader unit.
  • this allows the use of a device for transferring the data, which comprises the managing unit and one card reader unit for receiving the memory cards.
  • the first memory card is replaced by the second memory card after the data to be transferred have been received in the managing unit.
  • the managing unit may temporarily store the data to be transferred, while the first memory card is replaced by the second memory card.
  • the memory cards are connected to the managing unit simultaneously.
  • an interface allows for connecting the memory cards to the managing unit simultaneously.
  • the memory cards thus do not have to be replaced during the process of transferring data from one card to another.
  • One exemplary embodiment of the method, the device and the system comprises that the managing unit and at least one interface for connecting one memory card to the managing unit is included in one device.
  • the integration of the managing unit and at least one interface into one device leads to a reduction of the number of devices that may be needed for transferring the data.
  • the device and the system at least one interface for connecting to a memory card is included in a host device, the host device being connected to the managing unit via a data link.
  • a memory card can be connected to the managing unit via a host device, if the managing unit does not dispose of its own interface for connecting a memory card.
  • the data link between the managing unit and the host device may comprise a wired connection or a wireless connection.
  • the managing unit may be contained in a mobile communication device comprising a SIM card, said SIM card storing the credentials allocated to the memory cards.
  • SIM card refers to a smartcard offering identification and/or authentication services to a mobile communication network.
  • the smartcard may comprise a SIM (Subscriber Identity Module) application according to the GSM (Global System for Mobile Communications) standard, a USIM (Universal Subscriber Identity Module) according to the UMTS (Universal System for Mobile Telecommunications) standard or corresponding applications providing authentication and/or identification functions in connection with a mobile communication network.
  • SIM Subscriber Identity Module
  • GSM Global System for Mobile Communications
  • USIM Universal Subscriber Identity Module
  • UMTS Universal System for Mobile Telecommunications
  • SIM card When using such a SIM card for storing the credentials, existing security mechanisms of the SIM card may be used, which also allows for a secure storage of the credentials.
  • the managing unit may be included in a device that the data owner often already carries along in many situations.
  • the data to be transferred to the second memory card may only be read from the first memory card, after the first memory card has successfully verified the credential allocated to this card. Therefore, in an exemplary embodiment of the method, the device and the system, the credential allocated to the first memory card may be provided to the first memory card by the managing unit, and the data may be transmitted from the first memory card to the managing unit after having successfully verified said credential in the first memory card.
  • the managing unit may also identify the first memory card using an identification feature read out from the first memory card in order to be able to determine the credential allocated to the first memory card.
  • the device and the system comprises that a credential can only be provided to the first and/or the second memory card only after a user of the managing unit has been authenticated successfully in an authentication unit coupled to the managing unit.
  • unauthorised users are prevented from accessing the data securely stored in the memory cards by using the managing device.
  • the authentication unit may be included in the SIM card connected to the managing unit, since the SIM card already provides a reliable mechanism for authenticating a user.
  • the SIM card may unlock the function of the managing unit for providing a credential to a memory card, after having successfully authenticated the user.
  • FIG. 1 is a block diagram of a system for exchanging data between multiple memory cards according to a first exemplary embodiment of the present invention.
  • FIG. 2 is a block diagram of a system for exchanging data between multiple memory cards according to an alternative exemplary embodiment of the present invention.
  • FIG. 1 schematically depicts a system, in which data can be exchanged between multiple memory cards 102 a,b .
  • two memory cards 102 a,b are shown by way of example.
  • the system may comprise more than two memory cards 102 a,b .
  • the memory cards 102 a,b can store any kind of data, such as, for example, music files, digital photos, videos or other documents of the user.
  • Each memory card 102 a,b comprises a memory 104 a,b and a microcontroller 106 a,b integrated into a housing.
  • the housing may be small enough so that the owner can carry the memory card 102 a,b easily and that the memory card 102 a,b can be used in connection with card readers, which are integrated into small devices, such as, mobile communication devices.
  • the memory card 102 a,b may be configured according to a standard format, and may be an SD card, a CF card, a MMC or the like. Another example of a memory card format in the sense of this disclosure is a USB flash memory device.
  • the standard format may particularly specify the size and shape of the memory card 102 a,b , the configuration of its electric contacts and/or the communication protocols used in the communication with the memory card 102 a,b .
  • the standard compliance of the memory card 102 a,b allows the card to be accessed using card reader devices, which are likewise compliant with the standard.
  • memory cards 102 a,b that can exchange data among each other do not need to be the same types of cards. Rather, in the system a data exchange between memory cards 102 a,b of different types is also possible.
  • the memory 104 a,b is a non-volatile storage that can be electrically erased and reprogrammed.
  • the memory 104 a,b may be configured as a solid state storage unit, particularly as flash memory or as non-flash EEPROM (Electrically Erasable Programmable Read-Only Memory).
  • flash memory or as non-flash EEPROM (Electrically Erasable Programmable Read-Only Memory).
  • non-flash EEPROM Electrically Erasable Programmable Read-Only Memory
  • the memory 104 a,b may be constituted by one or more memory chips, which are arranged in the housing of the memory card 102 a,b.
  • the microcontroller 106 a,b and the memory 104 a,b may reside on one single chip within the memory card 102 a,b or the microcontroller 106 a,b may be a separate chip connected to the memory 104 a,b .
  • the microcontroller 106 provides functionality for accessing the memory 104 a,b using devices to which the memory card 102 a,b is connected.
  • the microcontroller 106 a,b implements the communication protocols used for the data exchange between the memory card 102 a,b and a connected device.
  • the memory 104 a,b of the memory cards 102 a,b is protected against unauthorized access, i.e. the unauthorized reading, writing and manipulating of the data stored in the memory cards 102 a,b .
  • This allows the user to store personal and/or sensitive data in the memory cards 102 a,b which are only provided for personal use or for sharing with selected other persons.
  • the microcontroller 106 a,b of that card may provide a security logic controlling access to the memory 104 a,b .
  • the security logic of the microcontroller 106 a,b permits accessing the memory 104 a,b only after a credential has been provided and successfully verified.
  • the credential may be a code, such as a password or a PIN (Personal Identification Number), or a digital signature, for example.
  • the system depicted in FIG. 1 comprises one managing device 108 .
  • the managing device 108 is a mobile communication device, such as, for example, a cellular phone, a PDA (personal data assistant) or the like.
  • the managing device 108 comprises a microprocessor 110 controlling the operation of the managing device 108 .
  • the microprocessor 110 is coupled to a memory unit 112 that stores software programs that can be run on the microprocessor 110 and data used in the operation of the managing device 108 .
  • a user may operate the managing device 108 using an input unit 114 , such as, for example, a keypad, and a display unit 116 , such as, for example, a monitor.
  • the input unit 114 and the display unit are also coupled to the microprocessor 110 .
  • the managing device 108 may comprise a radio module, which is not shown in FIG. 1 , the radio module allowing connecting the managing device 108 to a mobile communication network via a radio access network.
  • the mobile communication network may a GSM (global system for mobile telecommunications) or a UMTS (universal mobile telecommunications system) network.
  • a further component of the system is a smartcard 118 , which is inserted into the managing device 108 .
  • the managing device 108 may comprise a card reader that is not depicted in FIG. 1 .
  • the smartcard 118 comprises a microcontroller providing a secure environment for the execution of applications and the storage of data. Particularly, this means that unauthorized access to data and processes is prevented due to the hardware design of the microcontroller and due to cryptographic mechanisms used for managing data in the microcontroller.
  • the smartcard 118 is physically protected against manipulations, such as, power analysis, reverse engineering etc.
  • Accessing the functions of the smartcard 118 and data stored therein requires that the smartcard 118 authenticates the user of the host device 108 .
  • the user authentication is performed using a secret credential allocated to the user, which is entered at the managing device 108 and passed to the smartcard 118 .
  • the credential is checked by a security mechanism, which unlocks the functions and data after having successfully verified the credential.
  • a security mechanism which unlocks the functions and data after having successfully verified the credential.
  • all or some of the functions of the managing device 108 are protected and have to be unlocked by the smartcard 118 .
  • the smartcard 118 may unlock these functions after having successfully verified the credential.
  • the smartcard 118 may be used in conjunction with a utilization of the managing device 108 in the mobile communication network.
  • the smartcard 118 may comprises an application, which provides identification and authenticating services to the mobile communication network.
  • the smartcard 118 is configured as a SIM (subscriber identity module) card according to the GSM standard comprising a SIM application, which provides the identification and authentication service.
  • the smartcard 118 is configured as a UICC (universal integrated circuit card) comprising a USIM (universal subscriber identification module) application providing the identification and authentication service.
  • SIM card In the following the smartcard 118 is referred to as SIM card.
  • SIM card is to be understood as including also smartcards 118 comprising USIM applications or corresponding applications providing authentication and/or identification functions in connection with a mobile communication network.
  • the memory cards 102 a,b are being connected to the SIM card 118 .
  • the memory cards 102 a,b may be inserted into card reader units 120 a,b , which are suitable to receive memory cards 102 a,b of the respective card format.
  • the card reader units 120 a,b are connected to an interface of the managing device 108 via data links.
  • the data links may be wired links or wireless links. Examples of wireless links are radio connections, such as, for example, Bluetooth connections, or infrared connections.
  • the interface of the managing device 108 connects the card reader units 120 a,b to the SIM card 118 .
  • the managing device 108 may comprise one or more card reader units 120 a,b for receiving memory cards 102 a,b .
  • one or more memory cards 102 a,b can be inserted into the card reader units 120 a,b available in the managing device 108 and can be connected with the SIM card 118 via these card reader units 120 a,b.
  • At least one memory card 102 a,b may comprise a radio interface so that the memory card 120 a,b can be connected to a radio interface of the managing device 108 , which connects the memory card 102 a,b to the SIM card 118 inserted into the managing device 108 .
  • a card reader unit 120 a,b for receiving the memory card 102 a,b can be dispensed with.
  • the SIM card 118 likewise provides a radio interface
  • a radio enabled memory card 102 a,b may also be connected directly with the SIM card 118 via a radio link.
  • the radio link between the memory card 102 a,b and the managing device 108 may be a short range radio link, such as, for example, an NFC (Near Field Communication) or a ZigBee link.
  • the credentials which are necessary for accessing the memory 104 a,b of the memory cards 102 a,b are securely stored in the SIM card 118 . They are passed to the SIM card 118 using an application of the SIM card 118 or an application of managing device 108 , which communicates with the SIM card 118 .
  • the application allows to enter the credentials and to store them in the SIM card 118 after the credential assigned to the SIM card 118 has been successfully verified.
  • the user interacts with the application using the input unit 114 and the display unit 116 of the managing device 108 .
  • the application may provide a graphical user interface, which is presented at the display unit 116 and the application may be controlled by the user utilising the input unit 114 .
  • the input unit 114 may be used to enter the credentials.
  • the credentials stored in the SIM card 118 are used for exchanging data between the memory cards 102 a,b utilizing the managing device 108 .
  • the storage of the credentials may be combined with a management of the memory cards 102 a,b available.
  • the memory cards 102 a,b available are identified in a file or database of the SIM card 118 .
  • unique identification codes which are allocated to the memory cards 102 a,b , may be entered in the file or database.
  • the identification codes may be stored in the memory cards 102 a,b at the time of manufacture, or they may be stored therein later on by the user. They may be stored in the memory cards 102 a,b without protection so that they can be read without providing the credential to the memory card 102 a,b , which is necessary to access the protected files.
  • a name and/or a description of the memory cards 102 a,b may be stored in the SIM card 118 . This information may be entered by the user to allow him to identify a memory card 102 a,b easily. For instance, the user may enter a description indicating the information stored in the memory card 102 a,b.
  • the file or database of the SIM card 118 stores the identification codes and allocation between the identification codes and the credentials allocated to the memory card 102 a,b .
  • the identification code of the memory card 102 a,b is read from the memory card 102 a,b .
  • the credential allocated to the identification code is determined and transmitted to the memory card 102 a,b .
  • the microcontroller 106 a,b of the memory card 102 a,b checks the validity of the credential and allows access to the data stored in the memory 104 a,b of the memory card 102 a,b , if the credential has been verified successfully.
  • the functionality of the managing device 108 for copying or moving data stored in one memory card 102 a,b to another memory card 102 a,b is provided via a software application, which may be executed by the microprocessor 110 and which communicates with the SIM card 118 .
  • the application is executed in the SIM card 118 .
  • the application may provide a graphical user interface which is presented on the display unit 116 of the managing device 108 . Commands for controlling the application may be input by the user utilising the input unit 114 of the managing device 108 .
  • the application may be started by the user after he has input the credential for accessing the SIM card 118 .
  • the functions of the managing device 108 can only be accessed after the managing device 108 has been unlocked by the SIM card 118 , where the unlocking of the functions of managing device 108 requires the successful verification of the credential in the SIM card 118 .
  • This mechanism which is particularly provided in managing devices 108 that are configured as mobile communication devices, already ensures that the application for controlling the data exchange between the memory cards 102 a,b cannot be started without the user authentication in the SIM card 118 .
  • the user After having started the application the user selects one memory card 102 a,b as the source for a data transfer, i.e. the user selects the memory card 102 a,b storing the data that the user wants to transfer to another memory card 102 a,b.
  • the selection can be made among the memory cards 102 a,b , which are registered in the SIM card 118 , i.e. those memory cards 102 a,b to which a credential is allocated that is stored in the SIM card 118 .
  • the registered memory cards 102 a,b may be identified in a list presented at the display unit 116 of the managing device 108 and the user may select one memory card 102 a,b from the list using the input unit of the managing device 108 . In the list, the names allocated to the memory cards 102 a,b and stored in the SIM card 118 and/or the description of the memory cards 102 a,b may be given.
  • the application may determine, which registered memory cards 102 a,b are connected to the managing device 108 and presents only those memory cards 102 a,b , which are connected to managing device 108 , in the list. Thus, it is ensured that the user can only select the source memory cards 102 a,b among those registered memory cards 102 a,b , which are connected to the managing device 108 .
  • the memory card 102 a is the data source and that the memory card 102 b is the target of the data transfer.
  • the user may select the files, which are to be transferred to another memory card 102 b .
  • the application may access the source memory card 102 a and read the file names of the files stored therein. Accessing the memory card 102 a requires that the credential allocated to the memory card 102 a is transmitted from the SIM card 118 to the memory card 102 a and that the microcontroller 106 a of the memory card 102 a verifies the credential. After having verified the credential successfully, the microcontroller 106 a of the source memory card 102 a allows the application to access the memory 104 a of the memory card 102 a and read the file names.
  • the read files names may be presented to the user at the display unit 116 of the managing device 108 and the user may select the files using the input unit 114 of the managing device 108 .
  • the user selects the memory card 102 b as the target for the data transfer. This means that the user selects the memory card 102 b to which the files are to be transferred.
  • the memory cards 102 a,b which are registered in the SIM card 118 and which are connected to the managing device 108 may be again presented to the user at the display unit 116 of the managing device 108 .
  • the source memory card 102 a may not be made selectable as the target memory card 102 b.
  • the selection of the target memory card 102 b may be made using a so called drag and drop mechanism, where the user drags symbols representing the files to be transferred to a symbol representing the target memory card 102 b in the graphical user interface provided by the application.
  • the selection of the target memory card 102 b may also be made in another way.
  • the user may be given opportunity to decide whether the selected files shall be copied or moved to the target memory card 102 b , such as whether the files to be transferred shall be deleted in the source memory card 102 a or whether they shall remain stored in the source memory card 102 a.
  • the application retrieves the files selected for the data transfer from the source memory card 102 a,b and forwards the files to the target memory card 102 b .
  • the files are then stored in the memory 104 b .
  • the application transmits the credential allocated to that memory card 102 b , which is stored in the SIM card 118 , to the target memory card 102 a .
  • the microcontroller 106 b of the target memory card 102 b checks the credential and after having successfully verified the credential, it allows writing the files to the memory 104 b of the target memory card 102 b .
  • the application deletes the files in the source memory card 102 a or controls the microcontroller 106 a of the memory card 102 a to delete the files.
  • the managing device 108 comprises one card reader unit 201 for accepting the memory cards 102 a,b .
  • the memory cards 102 a,b which are used in this exemplary embodiment of the system, should be of the same type so that they can be received in the card reader unit 201 . If memory cards 102 a,b of different types are used, suitable adapters may be provided to make those memory cards 102 a,b compatible to the card reader unit 201 , which do not have a compatible format.
  • the exemplary embodiment depicted in FIG. 2 differs from the exemplary embodiment described before in connection with FIG. 1 in that not all memory cards 102 a,b are connected to the managing device 108 at the same time. Rather, the source memory card 102 a is inserted into the card reader unit 201 at first and than the source memory card 102 a is replaced by the target memory card 102 b . While replacing the source memory card 102 a with the target memory card 102 b , the files to be transferred, which have been read from the source memory card 102 a are temporarily stored in the managing device 108 before the written to the target memory card 102 b.
  • the application for controlling data exchange may again be started by the user as in the exemplary embodiment described before after he has input the credential for accessing the SIM card 118 .
  • the user For selecting the files of the source memory card 102 a , which are to be transferred to the target memory card 102 b , the user inserts the source memory card 102 a into the card reader unit 201 of the managing device 108 . In FIG. 2 , this is schematically depicted by the arrow A.
  • the application may identify the source memory card 102 a,b by reading the identification code of the memory card 102 a,b and that the allocated name and/or description of the memory card 102 a,b is presented in the graphical user interface provided by the application.
  • the application may access the source memory card 102 a and read the file names of the files stored therein.
  • This requires that the credential allocated to the memory card 102 a is transmitted from the SIM card 118 to the memory card 102 a and that the microcontroller 106 a of the memory card 102 a verifies the credential.
  • the microcontroller 106 a of the source memory card 102 a allows the application to access the memory 104 a,b of the memory card 102 a,b and read the file names.
  • the read file names may be presented again to the user at the display unit 116 of the managing device 108 and the user may select the files using the input unit 114 of the managing device 108 .
  • the user may also decide, whether the files shall be copied or moved to the target memory card 102 b.
  • the application reads the selected files from the source memory card 102 a and stores the files in the memory unit 112 of the managing device 108 or it stores the files in the SIM card 118 .
  • the latter has the advantage that the files are protected by the security architecture of the SIM card 118 , when they are stored in the managing device 108 . If the user has decided that the files shall not be copied but moved, the application also deletes the files from the memory card 102 a,b or controls the microcontroller 106 a,b of the memory card 102 a,b to delete the files.
  • the user is requested to remove the source memory card 102 a,b from the card reader unit 201 and to insert the target memory card 102 a,b .
  • the user removes the source memory card 102 a from the card reader unit 201 , what is depicted in FIG. 2 by arrow B, and inserts the target memory card 102 b into the card reader unit 201 , what is schematically depicted by arrow C.
  • the user may confirm the transfer of the data to target memory card 102 b .
  • the application identifies the target memory card 102 b by reading the identification code of the memory card 102 b and that the allocated name and/or description of the memory card 102 b is presented in the graphical user interface provided by the application before the user confirm the data transfer.
  • the application transmits the files, which are stored in the managing device 108 , to the target memory card 102 b and stores the files in the memory 104 a of the target memory card 102 b .
  • the application transmits the credential allocated to that memory card 102 b , which is stored in the SIM card 118 , to target memory card 102 b at first.
  • the microcontroller 106 b of the target memory card 102 b checks the credential and after having successfully verified the credential, it allows writing the files to the memory 104 b of the target memory card 102 b .
  • the files After the files have been stored in the target memory card 102 b , they may be deleted in the managing device 108 .
  • the managing device 108 stores the files only temporarily, while the user replaces the source memory card 102 a with the target memory card 102 b.

Abstract

There is provided a method for transferring data from a first memory card to a second memory card, each memory card allowing reading and/or writing access upon verification of an allocated credential. An exemplary method comprises providing the credentials allocated to the memory cards to a managing unit. The exemplary method also comprises receiving in the managing unit data from the first memory card and providing to the second memory card the credential allocated to the second memory card by the managing unit. The exemplary method additionally comprises forwarding the data from the managing device to the second memory card and storing the data in the second memory card after having successfully verified said credential in the second memory card.

Description

    CROSS REFERENCE TO RELATED APPLICATION
  • This application claims priority to European (EP) Patent Application No. 08017897.3, filed on Oct. 13, 2008, the contents of which are incorporated by reference as if set forth in their entirety herein.
  • BACKGROUND
  • Memory cards are integrated circuit (IC) cards including non-volatile memory and a controller, which controls the operation of the memory card. Such memory cards are used with personal computers (PCs), cellular telephones, personal digital assistants (PDAs), digital cameras, portable audio players and other host electronic devices for storage of data. A plurality of standards exists that specify different types of memory cards, such as, for example, SD (Secure Digital) cards, CF (Compact Flash) cards and MMCs (Multimedia Cards). A further example of a memory card, in the sense the term is used herein, is a USB (universal serial bus) flash memory device.
  • Memory cards of the type described before may provide a security mechanism for protecting data from unauthorized access. The card owner may access the data using a credential, such as, for example, a password. This allows for storing sensitive data in the memory card, such as, for example, banking details of the card owner, medical data of the card owner and personal photographs or other personal data.
  • Often users own multiple protected memory cards, and they may wish to transfer data from one of memory card to another one of his memory card.
  • SUMMARY OF THE INVENTION
  • Exemplary embodiments of the present invention may relate to memory cards with access protection. More specifically, an exemplary embodiment of the present invention may relate to a method, a device and a system for transferring data from a first memory card to a second memory card.
  • An exemplary embodiment of the present invention may allow for transferring data from one protected memory card of a user to another protected memory card of the user.
  • In an exemplary embodiment of the present invention, a method for transferring data from a first memory card to a second memory card is suggested. Each memory card allows reading and/or writing access upon verification of an allocated credential. The method comprises the following steps:
      • providing the credentials allocated to the memory cards to a managing unit;
      • receiving in the managing unit data from the first memory card;
      • providing to the second memory card the credential allocated to the second memory card by the managing unit,
      • forwarding the data from the managing device to the second memory card and storing the data in the second memory card after having successfully verified said credential in the second memory card.
  • An exemplary embodiment of the invention provides a device for transferring data from a first memory card to a second memory card. The exemplary system comprises at least two memory cards, each memory card allowing reading and/or writing access upon verification of an allocated credential. In the exemplary system, the memory cards can be coupled to a managing unit storing the credentials allocated to the memory cards. The managing unit may be adapted to receive data from the first memory card and to forward the data to the second memory card. The managing unit may be further adapted to provide to the second memory card the credential allocated to the second memory card.
  • According to an exemplary embodiment of the invention, an exemplary system for transferring data from a first memory card to a second memory card is provided. The exemplary system comprises the device and a first memory card and a second memory card. The second memory card may be adapted to store the data in the second memory card after having successfully verified the credential provided by the managing unit of the device.
  • Exemplary embodiments of the present invention may store credentials, which are necessary to read data from a memory card and/or write data to a memory card, in a managing unit. The managing unit may be used for transferring data from one protected memory card to another. This allows the owner of the memory cards to copy or move data from one memory card to another in an easy and convenient way.
  • In one exemplary embodiment of the method, the device and the system, the managing unit identifies the second memory card using an identification feature read out from the second memory card in order to be able to determine the credential allocated to the second memory card.
  • The identification feature, which may be an identification code, for example, may be stored in the memory card in unprotected form. In particular, it may be accessible without having to provide the allocated credential to the memory card.
  • In an exemplary embodiment of the method, the device and the system, the credential allocated to the second memory card may be determined using an allocation between the identification code and the credential stored in the managing unit.
  • In one exemplary embodiment of the method, the device and the system, a card reader unit coupled to the managing unit receives the first memory card, when the data is transmitted form the first memory card to the managing device. The card reader unit receives the second memory card, when the data is forwarded from the managing device to the second memory card.
  • In an exemplary embodiment, the data can be transferred from one protected memory card to another using only one card reader unit. In particular, this allows the use of a device for transferring the data, which comprises the managing unit and one card reader unit for receiving the memory cards.
  • In an exemplary embodiment of the invention, the first memory card is replaced by the second memory card after the data to be transferred have been received in the managing unit. The managing unit may temporarily store the data to be transferred, while the first memory card is replaced by the second memory card.
  • In an alternative exemplary embodiment of the method, the device and the system, the memory cards are connected to the managing unit simultaneously.
  • In such an exemplary embodiment, an interface allows for connecting the memory cards to the managing unit simultaneously. The memory cards thus do not have to be replaced during the process of transferring data from one card to another.
  • One exemplary embodiment of the method, the device and the system comprises that the managing unit and at least one interface for connecting one memory card to the managing unit is included in one device.
  • In an exemplary embodiment of the present invention, the integration of the managing unit and at least one interface into one device leads to a reduction of the number of devices that may be needed for transferring the data.
  • In one exemplary embodiment of the method, the device and the system, at least one interface for connecting to a memory card is included in a host device, the host device being connected to the managing unit via a data link.
  • A memory card can be connected to the managing unit via a host device, if the managing unit does not dispose of its own interface for connecting a memory card. The data link between the managing unit and the host device may comprise a wired connection or a wireless connection.
  • Furthermore, in one exemplary embodiment of the method, the device and the system, the managing unit may be contained in a mobile communication device comprising a SIM card, said SIM card storing the credentials allocated to the memory cards.
  • The term SIM card as used herein refers to a smartcard offering identification and/or authentication services to a mobile communication network. The smartcard may comprise a SIM (Subscriber Identity Module) application according to the GSM (Global System for Mobile Communications) standard, a USIM (Universal Subscriber Identity Module) according to the UMTS (Universal System for Mobile Telecommunications) standard or corresponding applications providing authentication and/or identification functions in connection with a mobile communication network.
  • When using such a SIM card for storing the credentials, existing security mechanisms of the SIM card may be used, which also allows for a secure storage of the credentials.
  • In addition to the advantage that the SIM card of the mobile communication device can be used to securely store the credentials, the managing unit may be included in a device that the data owner often already carries along in many situations.
  • In an exemplary embodiment, the data to be transferred to the second memory card may only be read from the first memory card, after the first memory card has successfully verified the credential allocated to this card. Therefore, in an exemplary embodiment of the method, the device and the system, the credential allocated to the first memory card may be provided to the first memory card by the managing unit, and the data may be transmitted from the first memory card to the managing unit after having successfully verified said credential in the first memory card.
  • The managing unit may also identify the first memory card using an identification feature read out from the first memory card in order to be able to determine the credential allocated to the first memory card.
  • In order to prevent an unauthorised person from using the managing unit, one exemplary embodiment of the method, the device and the system comprises that a credential can only be provided to the first and/or the second memory card only after a user of the managing unit has been authenticated successfully in an authentication unit coupled to the managing unit.
  • In an exemplary embodiment, unauthorised users are prevented from accessing the data securely stored in the memory cards by using the managing device.
  • The authentication unit may be included in the SIM card connected to the managing unit, since the SIM card already provides a reliable mechanism for authenticating a user. The SIM card may unlock the function of the managing unit for providing a credential to a memory card, after having successfully authenticated the user.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Reference will be made by way of example to the accompanying drawings in which:
  • FIG. 1 is a block diagram of a system for exchanging data between multiple memory cards according to a first exemplary embodiment of the present invention; and
  • FIG. 2 is a block diagram of a system for exchanging data between multiple memory cards according to an alternative exemplary embodiment of the present invention.
  • DETAILED DESCRIPTION OF SPECIFIC EMBODIMENTS
  • FIG. 1 schematically depicts a system, in which data can be exchanged between multiple memory cards 102 a,b. In FIG. 1 two memory cards 102 a,b are shown by way of example. However, the system may comprise more than two memory cards 102 a,b. The memory cards 102 a,b can store any kind of data, such as, for example, music files, digital photos, videos or other documents of the user.
  • Each memory card 102 a,b comprises a memory 104 a,b and a microcontroller 106 a,b integrated into a housing. The housing may be small enough so that the owner can carry the memory card 102 a,b easily and that the memory card 102 a,b can be used in connection with card readers, which are integrated into small devices, such as, mobile communication devices. The memory card 102 a,b may be configured according to a standard format, and may be an SD card, a CF card, a MMC or the like. Another example of a memory card format in the sense of this disclosure is a USB flash memory device. The standard format may particularly specify the size and shape of the memory card 102 a,b, the configuration of its electric contacts and/or the communication protocols used in the communication with the memory card 102 a,b. The standard compliance of the memory card 102 a,b allows the card to be accessed using card reader devices, which are likewise compliant with the standard.
  • It should be noted that the memory cards 102 a,b that can exchange data among each other do not need to be the same types of cards. Rather, in the system a data exchange between memory cards 102 a,b of different types is also possible.
  • The memory 104 a,b is a non-volatile storage that can be electrically erased and reprogrammed. Particularly, the memory 104 a,b may be configured as a solid state storage unit, particularly as flash memory or as non-flash EEPROM (Electrically Erasable Programmable Read-Only Memory). However, the person skilled in the art understands that in principle any sort of memory device may be used. The memory 104 a,b may be constituted by one or more memory chips, which are arranged in the housing of the memory card 102 a,b.
  • The microcontroller 106 a,b and the memory 104 a,b may reside on one single chip within the memory card 102 a,b or the microcontroller 106 a,b may be a separate chip connected to the memory 104 a,b. The microcontroller 106 provides functionality for accessing the memory 104 a,b using devices to which the memory card 102 a,b is connected. In particular, the microcontroller 106 a,b implements the communication protocols used for the data exchange between the memory card 102 a,b and a connected device.
  • The memory 104 a,b of the memory cards 102 a,b is protected against unauthorized access, i.e. the unauthorized reading, writing and manipulating of the data stored in the memory cards 102 a,b. This allows the user to store personal and/or sensitive data in the memory cards 102 a,b which are only provided for personal use or for sharing with selected other persons. For protecting the memory 104 a,b of a memory card 102 a,b, the microcontroller 106 a,b of that card may provide a security logic controlling access to the memory 104 a,b. The security logic of the microcontroller 106 a,b permits accessing the memory 104 a,b only after a credential has been provided and successfully verified. The credential may be a code, such as a password or a PIN (Personal Identification Number), or a digital signature, for example.
  • The system depicted in FIG. 1 comprises one managing device 108. In one exemplary embodiment, the managing device 108 is a mobile communication device, such as, for example, a cellular phone, a PDA (personal data assistant) or the like. The managing device 108 comprises a microprocessor 110 controlling the operation of the managing device 108. The microprocessor 110 is coupled to a memory unit 112 that stores software programs that can be run on the microprocessor 110 and data used in the operation of the managing device 108. A user may operate the managing device 108 using an input unit 114, such as, for example, a keypad, and a display unit 116, such as, for example, a monitor. The input unit 114 and the display unit are also coupled to the microprocessor 110.
  • Furthermore, the managing device 108 may comprise a radio module, which is not shown in FIG. 1, the radio module allowing connecting the managing device 108 to a mobile communication network via a radio access network. For instance, the mobile communication network may a GSM (global system for mobile telecommunications) or a UMTS (universal mobile telecommunications system) network.
  • A further component of the system is a smartcard 118, which is inserted into the managing device 108. For receiving the smart card 118, the managing device 108 may comprise a card reader that is not depicted in FIG. 1. The smartcard 118 comprises a microcontroller providing a secure environment for the execution of applications and the storage of data. Particularly, this means that unauthorized access to data and processes is prevented due to the hardware design of the microcontroller and due to cryptographic mechanisms used for managing data in the microcontroller. Moreover, the smartcard 118 is physically protected against manipulations, such as, power analysis, reverse engineering etc.
  • Accessing the functions of the smartcard 118 and data stored therein requires that the smartcard 118 authenticates the user of the host device 108.
  • The user authentication is performed using a secret credential allocated to the user, which is entered at the managing device 108 and passed to the smartcard 118. In the smartcard 118, the credential is checked by a security mechanism, which unlocks the functions and data after having successfully verified the credential. Furthermore, it may be provided that all or some of the functions of the managing device 108 are protected and have to be unlocked by the smartcard 118. The smartcard 118 may unlock these functions after having successfully verified the credential.
  • The smartcard 118 may be used in conjunction with a utilization of the managing device 108 in the mobile communication network. In particular, the smartcard 118 may comprises an application, which provides identification and authenticating services to the mobile communication network. If the mobile communication network is a GSM network, the smartcard 118 is configured as a SIM (subscriber identity module) card according to the GSM standard comprising a SIM application, which provides the identification and authentication service. If the mobile communication network is a UMTS network, the smartcard 118 is configured as a UICC (universal integrated circuit card) comprising a USIM (universal subscriber identification module) application providing the identification and authentication service.
  • In the following the smartcard 118 is referred to as SIM card. However, the term SIM card, as used herein, is to be understood as including also smartcards 118 comprising USIM applications or corresponding applications providing authentication and/or identification functions in connection with a mobile communication network.
  • For exchanging data between the memory cards 102 a,b, the memory cards 102 a,b are being connected to the SIM card 118. For this purpose, the memory cards 102 a,b may be inserted into card reader units 120 a,b, which are suitable to receive memory cards 102 a,b of the respective card format. The card reader units 120 a,b are connected to an interface of the managing device 108 via data links. The data links may be wired links or wireless links. Examples of wireless links are radio connections, such as, for example, Bluetooth connections, or infrared connections. The interface of the managing device 108 connects the card reader units 120 a,b to the SIM card 118.
  • In further exemplary embodiments, which are not depicted in FIG. 1, the managing device 108 may comprise one or more card reader units 120 a,b for receiving memory cards 102 a,b. In this case, one or more memory cards 102 a,b can be inserted into the card reader units 120 a,b available in the managing device 108 and can be connected with the SIM card 118 via these card reader units 120 a,b.
  • As a further alternative, at least one memory card 102 a,b may comprise a radio interface so that the memory card 120 a,b can be connected to a radio interface of the managing device 108, which connects the memory card 102 a,b to the SIM card 118 inserted into the managing device 108. Here, a card reader unit 120 a,b for receiving the memory card 102 a,b can be dispensed with. If the SIM card 118 likewise provides a radio interface, a radio enabled memory card 102 a,b may also be connected directly with the SIM card 118 via a radio link. The radio link between the memory card 102 a,b and the managing device 108 may be a short range radio link, such as, for example, an NFC (Near Field Communication) or a ZigBee link.
  • The credentials, which are necessary for accessing the memory 104 a,b of the memory cards 102 a,b are securely stored in the SIM card 118. They are passed to the SIM card 118 using an application of the SIM card 118 or an application of managing device 108, which communicates with the SIM card 118. The application allows to enter the credentials and to store them in the SIM card 118 after the credential assigned to the SIM card 118 has been successfully verified. The user interacts with the application using the input unit 114 and the display unit 116 of the managing device 108. The application may provide a graphical user interface, which is presented at the display unit 116 and the application may be controlled by the user utilising the input unit 114. In particular, the input unit 114 may be used to enter the credentials. After having stored the credentials allocated to the memory cards 102 a,b in the SIM card 118, the security mechanism of the SIM card 118 described before protects the credentials from being accessed by unauthorized third parties.
  • The credentials stored in the SIM card 118 are used for exchanging data between the memory cards 102 a,b utilizing the managing device 108. In particular, this means that the managing device 108 can be used for copying or moving data from one memory card 102 a,b to the other memory card 102 a,b. Furthermore, the storage of the credentials may be combined with a management of the memory cards 102 a,b available.
  • Particularly, this means that the memory cards 102 a,b available are identified in a file or database of the SIM card 118. For this purpose, unique identification codes, which are allocated to the memory cards 102 a,b, may be entered in the file or database. The identification codes may be stored in the memory cards 102 a,b at the time of manufacture, or they may be stored therein later on by the user. They may be stored in the memory cards 102 a,b without protection so that they can be read without providing the credential to the memory card 102 a,b, which is necessary to access the protected files. In addition, a name and/or a description of the memory cards 102 a,b may be stored in the SIM card 118. This information may be entered by the user to allow him to identify a memory card 102 a,b easily. For instance, the user may enter a description indicating the information stored in the memory card 102 a,b.
  • The file or database of the SIM card 118 stores the identification codes and allocation between the identification codes and the credentials allocated to the memory card 102 a,b. Each time a memory card 102 a,b is accessed, the identification code of the memory card 102 a,b is read from the memory card 102 a,b. Then, the credential allocated to the identification code is determined and transmitted to the memory card 102 a,b. The microcontroller 106 a,b of the memory card 102 a,b checks the validity of the credential and allows access to the data stored in the memory 104 a,b of the memory card 102 a,b, if the credential has been verified successfully.
  • The functionality of the managing device 108 for copying or moving data stored in one memory card 102 a,b to another memory card 102 a,b is provided via a software application, which may be executed by the microprocessor 110 and which communicates with the SIM card 118. In another exemplary embodiment, the application is executed in the SIM card 118. For allowing the user to control the data exchange, the application may provide a graphical user interface which is presented on the display unit 116 of the managing device 108. Commands for controlling the application may be input by the user utilising the input unit 114 of the managing device 108.
  • The application may be started by the user after he has input the credential for accessing the SIM card 118. As described before, in one exemplary embodiment, the functions of the managing device 108 can only be accessed after the managing device 108 has been unlocked by the SIM card 118, where the unlocking of the functions of managing device 108 requires the successful verification of the credential in the SIM card 118. This mechanism, which is particularly provided in managing devices 108 that are configured as mobile communication devices, already ensures that the application for controlling the data exchange between the memory cards 102 a,b cannot be started without the user authentication in the SIM card 118.
  • After having started the application the user selects one memory card 102 a,b as the source for a data transfer, i.e. the user selects the memory card 102 a,b storing the data that the user wants to transfer to another memory card 102 a,b.
  • The selection can be made among the memory cards 102 a,b, which are registered in the SIM card 118, i.e. those memory cards 102 a,b to which a credential is allocated that is stored in the SIM card 118. The registered memory cards 102 a,b may be identified in a list presented at the display unit 116 of the managing device 108 and the user may select one memory card 102 a,b from the list using the input unit of the managing device 108. In the list, the names allocated to the memory cards 102 a,b and stored in the SIM card 118 and/or the description of the memory cards 102 a,b may be given.
  • Since not all of the registered memory cards 102 a,b may be connected to the managing device 108, the application may determine, which registered memory cards 102 a,b are connected to the managing device 108 and presents only those memory cards 102 a,b, which are connected to managing device 108, in the list. Thus, it is ensured that the user can only select the source memory cards 102 a,b among those registered memory cards 102 a,b, which are connected to the managing device 108.
  • In the following example, it is assumed that the memory card 102 a is the data source and that the memory card 102 b is the target of the data transfer.
  • After the user has selected the memory cards 102 a as the source for the data transfer, the user may select the files, which are to be transferred to another memory card 102 b. For this purpose, the application may access the source memory card 102 a and read the file names of the files stored therein. Accessing the memory card 102 a requires that the credential allocated to the memory card 102 a is transmitted from the SIM card 118 to the memory card 102 a and that the microcontroller 106 a of the memory card 102 a verifies the credential. After having verified the credential successfully, the microcontroller 106 a of the source memory card 102 a allows the application to access the memory 104 a of the memory card 102 a and read the file names. The read files names may be presented to the user at the display unit 116 of the managing device 108 and the user may select the files using the input unit 114 of the managing device 108.
  • In a further step, the user selects the memory card 102 b as the target for the data transfer. This means that the user selects the memory card 102 b to which the files are to be transferred. For selecting the target memory card 102 b, the memory cards 102 a,b, which are registered in the SIM card 118 and which are connected to the managing device 108 may be again presented to the user at the display unit 116 of the managing device 108. In one exemplary embodiment, the source memory card 102 a may not be made selectable as the target memory card 102 b.
  • The selection of the target memory card 102 b may be made using a so called drag and drop mechanism, where the user drags symbols representing the files to be transferred to a symbol representing the target memory card 102 b in the graphical user interface provided by the application. However the selection of the target memory card 102 b may also be made in another way.
  • Furthermore, the user may be given opportunity to decide whether the selected files shall be copied or moved to the target memory card 102 b, such as whether the files to be transferred shall be deleted in the source memory card 102 a or whether they shall remain stored in the source memory card 102 a.
  • After the user has selected the target memory card 102 b the application retrieves the files selected for the data transfer from the source memory card 102 a,b and forwards the files to the target memory card 102 b. In the target memory card 102 b, the files are then stored in the memory 104 b. For accessing the target memory card 102 b the application transmits the credential allocated to that memory card 102 b, which is stored in the SIM card 118, to the target memory card 102 a. The microcontroller 106 b of the target memory card 102 b checks the credential and after having successfully verified the credential, it allows writing the files to the memory 104 b of the target memory card 102 b. Furthermore, if the user has decided, that the files shall not be copied but moved to the target memory cards 102 b, the application deletes the files in the source memory card 102 a or controls the microcontroller 106 a of the memory card 102 a to delete the files.
  • Another exemplary embodiment of a system for exchanging data between memory cards 102 a,b is depicted in FIG. 2. In this exemplary embodiment, the managing device 108 comprises one card reader unit 201 for accepting the memory cards 102 a,b. The memory cards 102 a,b, which are used in this exemplary embodiment of the system, should be of the same type so that they can be received in the card reader unit 201. If memory cards 102 a,b of different types are used, suitable adapters may be provided to make those memory cards 102 a,b compatible to the card reader unit 201, which do not have a compatible format.
  • The exemplary embodiment depicted in FIG. 2 differs from the exemplary embodiment described before in connection with FIG. 1 in that not all memory cards 102 a,b are connected to the managing device 108 at the same time. Rather, the source memory card 102 a is inserted into the card reader unit 201 at first and than the source memory card 102 a is replaced by the target memory card 102 b. While replacing the source memory card 102 a with the target memory card 102 b, the files to be transferred, which have been read from the source memory card 102 a are temporarily stored in the managing device 108 before the written to the target memory card 102 b.
  • In the exemplary embodiment depicted in FIG. 2, the application for controlling data exchange may again be started by the user as in the exemplary embodiment described before after he has input the credential for accessing the SIM card 118. For selecting the files of the source memory card 102 a, which are to be transferred to the target memory card 102 b, the user inserts the source memory card 102 a into the card reader unit 201 of the managing device 108. In FIG. 2, this is schematically depicted by the arrow A.
  • After the memory card 102 a has been inserted into the card reader unit 201, the application may identify the source memory card 102 a,b by reading the identification code of the memory card 102 a,b and that the allocated name and/or description of the memory card 102 a,b is presented in the graphical user interface provided by the application.
  • After the user has inserted the source memory card 102 a into the card reader unit 201, the application may access the source memory card 102 a and read the file names of the files stored therein. This requires that the credential allocated to the memory card 102 a is transmitted from the SIM card 118 to the memory card 102 a and that the microcontroller 106 a of the memory card 102 a verifies the credential. After having verified the credential successfully, the microcontroller 106 a of the source memory card 102 a allows the application to access the memory 104 a,b of the memory card 102 a,b and read the file names. The read file names may be presented again to the user at the display unit 116 of the managing device 108 and the user may select the files using the input unit 114 of the managing device 108. In addition to selecting the files for the data transfer, the user may also decide, whether the files shall be copied or moved to the target memory card 102 b.
  • Then, the application reads the selected files from the source memory card 102 a and stores the files in the memory unit 112 of the managing device 108 or it stores the files in the SIM card 118. The latter has the advantage that the files are protected by the security architecture of the SIM card 118, when they are stored in the managing device 108. If the user has decided that the files shall not be copied but moved, the application also deletes the files from the memory card 102 a,b or controls the microcontroller 106 a,b of the memory card 102 a,b to delete the files.
  • After the files have been stored in the managing device 108, the user is requested to remove the source memory card 102 a,b from the card reader unit 201 and to insert the target memory card 102 a,b. Upon this request the user removes the source memory card 102 a from the card reader unit 201, what is depicted in FIG. 2 by arrow B, and inserts the target memory card 102 b into the card reader unit 201, what is schematically depicted by arrow C.
  • When the target memory card 102 b is inserted into the card reader unit 201, the user may confirm the transfer of the data to target memory card 102 b. Here, it may be again provided that the application identifies the target memory card 102 b by reading the identification code of the memory card 102 b and that the allocated name and/or description of the memory card 102 b is presented in the graphical user interface provided by the application before the user confirm the data transfer.
  • After the confirmation of the user, the application transmits the files, which are stored in the managing device 108, to the target memory card 102 b and stores the files in the memory 104 a of the target memory card 102 b. For accessing the target memory card 102 b the application transmits the credential allocated to that memory card 102 b, which is stored in the SIM card 118, to target memory card 102 b at first. The microcontroller 106 b of the target memory card 102 b checks the credential and after having successfully verified the credential, it allows writing the files to the memory 104 b of the target memory card 102 b. After the files have been stored in the target memory card 102 b, they may be deleted in the managing device 108. Thus, the managing device 108 stores the files only temporarily, while the user replaces the source memory card 102 a with the target memory card 102 b.
  • While exemplary embodiments of the invention have been illustrated and described in detail in the drawings and foregoing description, such illustration and description are to be considered illustrative or exemplary and not restrictive; the invention is not limited to the disclosed exemplary embodiments. Other variations to the disclosed exemplary embodiments can be understood and effected by those skilled in the art in practicing the claimed invention, from a study of the drawings, the disclosure, and the appended claims.
  • In the claims, the word “comprising” does not exclude other elements or steps, and the indefinite article “a” or “an” does not exclude a plurality. A single processor or other unit may fulfil the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measured cannot be used to advantage.
  • Any reference signs in the claims should not be construed as limiting the scope.

Claims (21)

1-13. (canceled)
14. A computer-implemented method for transferring data from a first memory card to a second memory card, each memory card allowing reading and/or writing access upon verification of an allocated credential, the method comprising:
providing the credentials allocated to the memory cards to a managing unit;
receiving in the managing unit data from the first memory card;
providing to the second memory card the credential allocated to the second memory card by the managing unit; and
forwarding the data from the managing device to the second memory card and storing the data in the second memory card after having successfully verified said credential in the second memory card.
15. The computer-implemented method according to claim 14, wherein the managing unit identifies the second memory card using an identification feature read out from the second memory card in order to be able to determine the credential allocated to the second memory card.
16. The computer-implemented method according to claim 14, wherein the credential allocated to the second memory card is determined using an allocation between an identification code and the credential stored in the managing unit.
17. The computer-implemented method according to claim 14, comprising:
receiving the first memory card in a card reader unit coupled to the managing unit, when the data is transmitted from the first memory card to the managing device; and
receiving the second memory card in the card reader unit, when the data is forwarded from the managing device to the second memory card.
18. The computer-implemented method according to claim 14, wherein the managing unit temporarily stores the data to be transferred, while the first memory card is replaced by the second memory card.
19. The computer-implemented method according to claim 14, comprising simultaneously connecting the memory cards to the managing unit.
20. The computer-implemented method according to claim 14, wherein a single device comprises the managing unit and at least one interface that is adapted to connect one memory card to the managing unit.
21. The computer-implemented method according to claim 14, wherein a host device comprises at least one interface that is adapted to connect the managing unit to a memory card, the host device being connected to the managing unit via a data link.
22. The computer-implemented method according to claim 14, comprising storing the credentials allocated to the memory cards in a SIM card of a mobile communication device that contains the managing unit.
23. The computer-implemented method according to claim 14, comprising:
providing the credential allocated to the first memory card to the first memory card by the managing unit; and
transmitting the data from the first memory card to the managing unit after having successfully verified the credential in the first memory card.
24. The computer-implemented method according to claim 14, wherein a credential can only be provided to the first and/or the second memory card only after a user of the managing unit has been authenticated successfully in an authentication unit coupled to the managing unit.
25. A device for transferring data from a first memory card to a second memory card, each memory card allowing reading and/or writing access upon verification of a credential, the device comprising:
a managing unit coupled to the memory cards, the managing unit being adapted to store the credentials allocated to the memory cards, to receive data from the first memory card, to forward the data to the second memory card, and to provide to the second memory card the credential allocated to the second memory card.
26. The device according to claim 25, wherein the managing unit is adapted to identify the second memory card using an identification feature read out from the second memory card in order to be able to determine the credential allocated to the second memory card.
27. The device according to claim 25, wherein the credential allocated to the second memory card is determined using an allocation between an identification code and the credential stored in the managing unit.
28. The device according to claim 25, comprising a card reader coupled to the managing unit, the card reader being adapted to receive the first memory card when the data is transmitted from the first memory card to the managing unit, and to receive the second memory card when the data is forwarded from the managing unit to the second memory card.
29. The device according to claim 25, wherein the managing unit is adapted to temporarily store the data to be transferred while the first memory card is replaced by the second memory card.
30. The device according to claim 25, wherein both memory cards are simultaneously connected to the managing unit.
31. A system for transferring data from a first memory card to a second memory card, the system comprising:
a first memory card;
a second memory card;
a device for transferring data from the first memory card to the second memory card, each memory card allowing reading and/or writing access upon verification of a credential, the device comprising a managing unit coupled to the memory cards, the managing unit being adapted to store the credentials allocated to the memory cards, to receive data from the first memory card, to forward the data to the second memory card, and to provide to the second memory card the credential allocated to the second memory card; and
wherein the second memory card is adapted to store the data in the second memory card after having successfully verified the credential provided by the managing unit.
32. The system according to claim 31, wherein the managing unit is adapted to identify the second memory card using an identification feature read out from the second memory card in order to be able to determine the credential allocated to the second memory card.
33. The system according to claim 31, wherein the credential allocated to the second memory card is determined using an allocation between an identification code and the credential stored in the managing unit.
US12/577,288 2008-10-13 2009-10-12 Data exchange between protected memory cards Active 2030-08-18 US8700848B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP08017897 2008-10-13
EP08017897.3A EP2175393B1 (en) 2008-10-13 2008-10-13 Data exchange between protected memory cards
EP08017897.3 2008-10-13

Publications (2)

Publication Number Publication Date
US20100095062A1 true US20100095062A1 (en) 2010-04-15
US8700848B2 US8700848B2 (en) 2014-04-15

Family

ID=40158256

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/577,288 Active 2030-08-18 US8700848B2 (en) 2008-10-13 2009-10-12 Data exchange between protected memory cards

Country Status (2)

Country Link
US (1) US8700848B2 (en)
EP (1) EP2175393B1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130007365A1 (en) * 2011-06-30 2013-01-03 Stmicroelectronics S.R.L. Method for protecting a solid state memory
US20130169842A1 (en) * 2009-02-03 2013-07-04 Canon Kabushiki Kaisha Electronic device, method of controlling the same, and program
DE102013218511A1 (en) * 2013-09-16 2015-03-19 Continental Automotive Gmbh Digital tachograph
US9129139B2 (en) 2011-06-30 2015-09-08 Stmicroelectronics S.R.L. Solid state memory and method for protecting digital contents by interrupting copying or accessing and proceeding only upon user verification or authentication

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8474050B2 (en) * 2007-04-13 2013-06-25 At&T Intellectual Property I, L.P. System and apparatus for transferring data between communication elements
FR3000355A1 (en) * 2012-12-20 2014-06-27 France Telecom MANAGING ACCESS TO A PLURALITY OF SECURITY MODULES INCORPORATED IN A DATA PROCESSING DEVICE.
CN106503593A (en) * 2016-09-29 2017-03-15 宇龙计算机通信科技(深圳)有限公司 Data interactive method, data interaction device and terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050195975A1 (en) * 2003-01-21 2005-09-08 Kevin Kawakita Digital media distribution cryptography using media ticket smart cards
US7043642B1 (en) * 2000-05-22 2006-05-09 Gemplus Process to manage data in a chip card
US20080067240A1 (en) * 2004-07-22 2008-03-20 Toshihisa Nakano Electronic Value, Electronic Purse Device, And System For Using The Same
US20100029200A1 (en) * 2006-09-29 2010-02-04 Antonio Varriale Use, provision, customization and billing of services for mobile users through distinct electronic apparatuses
US20110131640A1 (en) * 2008-02-18 2011-06-02 Microelectronica Espanola S.A.U. Secure transfer of data

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2282683B (en) * 1993-09-08 1997-07-30 Gen Information Systems Ltd Exchange of data between portable data storage devices
EP1244050B1 (en) 2001-03-23 2009-01-28 PROTON WORLD INTERNATIONAL en abrégé PWI Process and device for saving of applications
US7146161B2 (en) * 2001-08-27 2006-12-05 Cheng-Hao Chou Subscriber identity module card backup system
JP2005100329A (en) * 2003-09-23 2005-04-14 Microtek Internatl Inc Multi-card data unloading device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7043642B1 (en) * 2000-05-22 2006-05-09 Gemplus Process to manage data in a chip card
US20050195975A1 (en) * 2003-01-21 2005-09-08 Kevin Kawakita Digital media distribution cryptography using media ticket smart cards
US20080067240A1 (en) * 2004-07-22 2008-03-20 Toshihisa Nakano Electronic Value, Electronic Purse Device, And System For Using The Same
US20100029200A1 (en) * 2006-09-29 2010-02-04 Antonio Varriale Use, provision, customization and billing of services for mobile users through distinct electronic apparatuses
US20110131640A1 (en) * 2008-02-18 2011-06-02 Microelectronica Espanola S.A.U. Secure transfer of data

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130169842A1 (en) * 2009-02-03 2013-07-04 Canon Kabushiki Kaisha Electronic device, method of controlling the same, and program
US9026175B2 (en) * 2009-02-03 2015-05-05 Canon Kabushiki Kaisha Electronic device, method of controlling the same, and program
US20130007365A1 (en) * 2011-06-30 2013-01-03 Stmicroelectronics S.R.L. Method for protecting a solid state memory
US9129139B2 (en) 2011-06-30 2015-09-08 Stmicroelectronics S.R.L. Solid state memory and method for protecting digital contents by interrupting copying or accessing and proceeding only upon user verification or authentication
US9529983B2 (en) * 2011-06-30 2016-12-27 Stmicroelectronics S.R.L. Solid state memory unit and method for protecting a memory including verification of a sequence of requests for access to physical blocks
US9875048B2 (en) 2011-06-30 2018-01-23 Stmicroelectronics S.R.L. Solid state memory unit and method for protecting a memory including verification of a sequence of requests for access to physical blocks
DE102013218511A1 (en) * 2013-09-16 2015-03-19 Continental Automotive Gmbh Digital tachograph
DE112014004227B4 (en) 2013-09-16 2023-12-14 Continental Automotive Technologies GmbH Digital tachograph

Also Published As

Publication number Publication date
EP2175393B1 (en) 2019-03-06
US8700848B2 (en) 2014-04-15
EP2175393A1 (en) 2010-04-14

Similar Documents

Publication Publication Date Title
US8700848B2 (en) Data exchange between protected memory cards
US9529734B2 (en) Smart storage device
US7357313B2 (en) Information processor-based service providing system and method
WO2005076204A1 (en) Smart card for containing plural issuer security domain and method for installing plural issuer security domain in a smart card
US20080120726A1 (en) External storage device
US9606810B2 (en) Method and apparatus for replacing the operating system of a limited-resource portable data carrier
US20120005732A1 (en) Person authentication system and person authentication method
CN101595488A (en) Be used for content is tied to the method and apparatus of independent storage arrangement
US8328104B2 (en) Storage device management systems and methods
US9524401B2 (en) Method for providing controlled access to a memory card and memory card
JP2005050306A (en) Information processor and information processing terminal
US8464941B2 (en) Method and terminal for providing controlled access to a memory card
WO2007119594A1 (en) Secure device and read/write device
JP4993114B2 (en) Shared management method for portable storage device and portable storage device
EP2175674B1 (en) Method and system for paring devices
KR101297527B1 (en) Circuit card data protection
US8276188B2 (en) Systems and methods for managing storage devices
US20100125706A1 (en) Provision of data stored in a memory card to a user device
CN117413267A (en) Firmware policy enforcement via secure processor
JP4291068B2 (en) IC card and IC card system
EP2159711A1 (en) A method for managing data between a terminal and a token, corresponding token and system
EP3340149A1 (en) Methods and systems for validating an interaction
TW201635205A (en) Security digital memory card with embedded smart chip, card reader terminal and controlling method thereof
WO2010083931A1 (en) Versatile electronic storage device

Legal Events

Date Code Title Description
AS Assignment

Owner name: VODAFONE HOLDING GMBH,GERMANY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KORAICHI, NAJIB;HOEKSEL, SEBASTIAAN;REEL/FRAME:023688/0316

Effective date: 20091126

Owner name: VODAFONE HOLDING GMBH, GERMANY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KORAICHI, NAJIB;HOEKSEL, SEBASTIAAN;REEL/FRAME:023688/0316

Effective date: 20091126

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551)

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8